PatchSiren cyber security CVE debrief
CVE-2021-47935 Sentry CVE debrief
CVE-2021-47935 is an authenticated remote code execution issue in Sentry’s audit-log handling. According to the supplied record, a superuser can submit crafted POST requests to the admin audit log endpoint with malicious pickle-serialized content in the data parameter and achieve command execution with application privileges.
- Vendor
- Sentry
- Product
- Unknown
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-10
- Original CVE updated
- 2026-05-10
- Advisory published
- 2026-05-10
- Advisory updated
- 2026-05-10
Who should care
Sentry administrators, security teams, and operators of deployments that expose admin interfaces or retain superuser accounts should treat this as a high-priority application-layer risk.
Technical summary
The supplied CVE description says Sentry 8.2.0 processes attacker-controlled audit-log data in a way that permits pickle deserialization of crafted objects. Because the attacker must be an authenticated superuser, the issue is not a pure unauthenticated remote exploit, but the impact is still severe: arbitrary command execution in the application context. The NVD metadata supplied with the record maps the issue to CWE-94 and gives a high-severity CVSS v4.0 vector with network attack access and low privileges required.
Defensive priority
High. The combination of authenticated access, code execution, and application-privilege impact warrants prompt review of exposed Sentry instances and privileged account controls.
Recommended defensive actions
- Confirm whether any deployed Sentry instances fall within the affected version range described in the CVE record.
- Apply the vendor’s remediation or upgrade to a non-vulnerable release once confirmed by official guidance.
- Restrict and audit superuser access to Sentry admin functions, especially audit-log endpoints.
- Monitor for unusual POST activity and suspicious base64/compressed payloads in audit-log data handling.
- Review application logs and administrative actions for signs of abuse, and rotate credentials or secrets if compromise is suspected.
Evidence notes
This debrief is based on the supplied CVE description and the official NVD/CVE records included in the source corpus. The record attributes the issue to CWE-94 and includes a high-severity CVSS v4.0 vector. The supplied enrichment does not list a CISA KEV entry. Vendor confidence is low in the provided metadata, so the Sentry attribution should be treated as needing review against vendor guidance.
Official resources
The supplied record shows CVE-2021-47935 published and modified on 2026-05-10. NVD status is 'Received,' and no KEV entry is listed in the provided enrichment.